XSS Shell
Download
Features
- Regenerating Pages
- This is one of the key and advanced features of XSS Shell. XSS Shell re-renders the infected page and keep user in virtual environment. Thus even user click any links in the infected page he or she will be still under control! (within cross-domain restrictions) In normal XSS attacks when user leaves the page you can't do anything
- Secondly this feature keeps the session open so even victim follow an outside link from infected page session is not going to timeout and you will be still in charge.
- Keylogger
- Mouse Logger (click points + current DOM)
- Built-in Commands;
- Get Keylogger Data
- Get Current Page (Current rendered DOM / like screenshot)
- Get Cookie
- Execute supplied javaScript (eval)
- Get Clipboard (IE only)
- Get internal IP address (Firefox + JVM only)
- Check victim's visited URL history
Installation
Install Admin Interface
- Copy "xssshell" folder into your web server
- Copy "db" to a secure place (below root)
- Configure "database path" from "xssshell/db.asp"
- Modify hard coded password in db.asp [default password is : w00t]
- Now you can access admin interface from something like http://[YOURHOST]/xssshell/
Configure XSS Shell for communication;
- Open xssshell.asp
- 2. Set "SERVER" variable to where your XSSShell folder is located. i.e: "http://[YOURHOST]/xssshell/";
- 3. Be sure to check "ME", "CONNECTOR", "COMMANDS_URL" variables. If you changed filenames, folder names or some kind of different configuration you need modify them.
- As a hunter be careful about possible "Backfire" in getSelfHTML(). Someone can hack you back or track you by another XSS or XSS Shell attack.
- Checkout "showdata.asp" and implement your own "filter()" function to make it safer for you.
- Put "On error resume next" to db.asp, better modify your web server to not show any error.
How to Extend
- Add new enum for your control
- Set a name and unique number like "CMD_GETCOOKIE"
- var CMD_SAMPLE = 78;
- Set datatype for your response (generally TEXT),
- dataTypes[CMD_SAMPLE] = TEXT;
- Write your function and add it to page
- function cmdSample(){return "yeah working !"}
- Call it
- Go inside to "function processGivenCommand(cmd)"
- Add a new case like "case CMD_SAMPLE:"
- Report it back
- Inside the case call log;
"log(cmdSample(), dataTypes[cmd.cmd], cmd.attackID, "waitAndRun()");"
- Inside the case call log;
- In db.asp just add a new element to "Commands" array (command name, command unique number, description).
i.e. "cmdSample()",78,"Command sample ! Just returns a message"
External Libraries
- moo.ajax -moofx.mad4milk.net
- script.aculo.us - (http://script.aculo.us, http://mir.aculo.us)
Publicar un comentario